Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

被引:0
作者
Uriarte Itzazelaia, Mikel [1 ]
Astorga, Jasone [2 ]
Jacob, Eduardo [2 ]
Huarte, Maider [2 ]
Romana, Pedro [1 ]
机构
[1] Nextel SA, Technol Pk Bizkaia 207B,1B, Zamudio 48170, Spain
[2] Univ Basque Country, UPV EHU, Fac Engn Bilbao, Dept Commun Engn, Plaza Ingn Torres Quevedo 1, Bilbao 48013, Spain
来源
SENSORS | 2018年 / 18卷 / 02期
关键词
access control model; fine-grained authorization; constrained device; expressive policy language; least privilege; message exchange protocol; policy codification; sensor; feasibility assessment; performance evaluation; SECURITY; INTERNET; PRIVACY; TRUST;
D O I
10.3390/s18020575
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.
引用
收藏
页数:32
相关论文
共 36 条
  • [1] A Survey on Authorization in Distributed Systems: Information Storage, Data Retrieval and Trust Evaluation
    Ahadipour, Ava
    Schanzenbach, Martin
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 1016 - 1023
  • [2] [Anonymous], 2014, CONSTRAINED APPL PRO
  • [3] [Anonymous], 2013, J INTERNET SERVICES
  • [4] [Anonymous], 2005, P IEEE INT C WEB SER
  • [5] [Anonymous], 2012, 6550 RFC
  • [6] [Anonymous], 2013, 7049 RFC
  • [7] [Anonymous], 2007, 802154A2007 IEEE
  • [8] Ladon: end-to-end authorisation support for resource-deprived environments
    Astorga, J.
    Jacob, E.
    Huarte, M.
    Higuero, M.
    [J]. IET INFORMATION SECURITY, 2012, 6 (02) : 93 - 101
  • [9] M2M Security: Challenges and Solutions
    Barki, Amira
    Bouabdallah, Abdelmadjid
    Gharout, Said
    Traore, Jacques
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) : 1241 - 1254
  • [10] The Internet of Things vision: Key features, applications and open issues
    Borgia, Eleonora
    [J]. COMPUTER COMMUNICATIONS, 2014, 54 : 1 - 31